The Trusted Solaris User's Guide is a guide to operating in the Trusted Solaris 8TMenvironment. As a prerequisite, you should be familiar with the Solaris 8 operating environment and the Common Desktop Environment (CDE). You should also be familiar with the security policy of your organization.
The Trusted Solaris 8 documentation set is supplemental to the Solaris 8 documentation set. You should obtain a copy of both sets for a complete understanding of the Trusted Solaris 8 operating environment. The Trusted Solaris documentation set consists of:
Trusted Solaris 8 Release Notes (805-8117-10) provides help for getting started with and using the Trusted Solaris 8 version of the software. It lists known problems and describes workarounds (primary audience: administrators; secondary audience: developers).
Trusted Solaris Installation and Configuration (805-8114-10) describes how to install the Trusted Solaris operating environment at networked or non-networked sites (primary audience: administrators, secondary audience: developers).
Trusted Solaris 8 Reference Manual (805-8124-10) provides a book version of all Trusted Solaris man pages in four volumes (primary audience: all).
Trusted Solaris User's Guide (805-8115-10) describes the basic features of the Trusted Solaris 8 environment from the end user's point of view. Although it is aimed at end users, it explains basic concepts which are of importance to administrators and application developers as well. It provides a glossary of terms covering the entire product (primary audience: end users, administrators, secondary audience: developers).
Trusted Solaris Administration Overview (805-8119-10) explains the concepts of administration in the Trusted Solaris operating environment and provides an overview of administrative tools and commands (primary audience: administrators, secondary audience: developers).
Trusted Solaris Administrator's Procedures (805-8120-10) provides detailed information for performing specific administration tasks and some detailed tables in the appendices useful for troubleshooting (primary audience: administrators, secondary audience: developers).
Trusted Solaris Audit Administration (805-8121-10) describes the auditing system (primary audience: administrators, secondary audience: developers).
Trusted Solaris Label Administration (805-8122-10) provides information on specifying label components in the label encodings file (primary audience: administrators).
Trusted Solaris Developer's Guide (805-8116-10) describes how to develop applications for the Trusted Solaris 8 environment (primary audience: developers, secondary audience: administrators).
Compartmented Mode Workstation Labeling: Encodings Format (805-8123-10) describes the syntax used in the label encodings file for enforcing the various rules concerning well-formed labels for a system (primary audience: administrators, secondary audience: developers).
Trusted Solaris 8 Transition Guide (805-8118-10) provides an overview of the differences between the Trusted Solaris 8 and Trusted Solaris 7 environments (primary audience: administrators, developers, secondary audience: end users).
Chapter 1, Introduction to Trusted Solaris provides an overview of the basic concepts needed to operate in the Trusted Solaris environment.
Chapter 2, Accessing and Leaving the Trusted Solaris Environment presents procedures necessary for accessing and leaving the Trusted Solaris environment.
Chapter 3, Tour of the Trusted Solaris Environment takes you for a quick tour of the Trusted Solaris environment. If you have access to a Trusted Solaris system, you can perform the steps as you read them; or you can get a good idea of the environment simply by reading and following the diagrams.
Chapter 4, Elements of the Trusted Solaris Environment explains the key elements in the Trusted Solaris environment.
Chapter 5, Managing Files and Directories shows you the basics of managing the security of files and directories in the Trusted Solaris environment.
Appendix A, Supplementary Documentation discusses man pages, online documentation, and online help in the Trusted Solaris operating environment.
For a list of Trusted Solaris and other Sun Microsystems, Inc. documents and how to order them, refer to http://www.fatbrain.com/.
The following table describes the type changes and symbols used in this book.
Table P-1 Typographic Conventions
Typeface or Symbol |
Meaning |
Example |
---|---|---|
AaBbCc123 |
The names of commands, files, and directories; on-screen computer output |
Edit your .login file. Use ls -a to list all files. system% You have mail.
|
AaBbCc123 |
What you type, contrasted with on-screen computer output |
system% su
Password: |
AaBbCc123 |
Command-line placeholder or variable name. Replace with a real name or value |
To delete a file, type rm filename. The errno variable is set. |
AaBbCc123 |
Book titles, new words or terms, or words to be emphasized |
Read Chapter 6 in User's Guide. These are called class options. You must be root to do this. |
Code samples are in code font. |
||
% |
UNIX C shell prompt |
system% |